Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Transaction Verification Model over Double Spending for Peer-to-Peer Digital Currency Transactions based on Blockchain Architecture

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Iresha Dilhani Rubasinghe, T. N. K. De Zoysa

Iresha Dilhani Rubasinghe and De T N K Zoysa. Transaction Verification Model over Double Spending for Peer-to-Peer Digital Currency Transactions based on Blockchain Architecture. International Journal of Computer Applications 163(5):24-31, April 2017. BibTeX

	author = {Iresha Dilhani Rubasinghe and T. N. K. De Zoysa},
	title = {Transaction Verification Model over Double Spending for Peer-to-Peer Digital Currency Transactions based on Blockchain Architecture},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2017},
	volume = {163},
	number = {5},
	month = {Apr},
	year = {2017},
	issn = {0975-8887},
	pages = {24-31},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2017913531},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Digital payment systems are an evolving field in present day with the recent enhancements in seamless digital currencies. Thus, despite the benefits of cryptocurrency based digital payments systems, their adoption and diffusion within general payment platform domain are significantly hindered. The blockchain architecture is widely recognized as a promising mechanism to support the management of cryptocurrency related transactions. However, ensuring the security of digital payment transactions is a challenging task due to various security threats and existing prevention mechanisms that are either computationally expensive or domain dependent. Among many, Double Spending is identified as a key security vulnerability.

The purpose of this study is to investigate the means of addressing the said security issue by proposing a feasible transaction verification methodology; targeting a common payment platform that integrates different vendor based digital currencies together. The currency miners and the user applications are identified as the core components that cooperate with transactions. Accordingly, a scenario based transaction verification model is designed by considering transaction patterns among miners and user applications. The bitcoin-similar concept of ‘trust network’ is adopted in verifying transactions via building a trusted network among currency miners in the payment platform using digital signatures along with SHA-256 hashing and RSA algorithm. In strengthening the verification level, an approach of acknowledgments is defined associated with a minimum required level of probability. Furthermore, a time constraint is set depending on the peer-to-peer network conditions for a particular transaction to get completed with proper verification.


  1. S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2012. [Online]. Available: [Accessed 2 May 2016].
  2. M. Bawa, et al., “Peer-to-Peer Research at Stanford,” Stanford, 2007.
  3. E. Nordstrom, “Personal Clouds: Concedo,” 2015.
  4. J. Wells, et al., “Enhanced Security for Preventing Man-in-the-Middle Attacks in Authentication, Data Entry and Transaction Verification,” in Australian Information Security Management, Perth, Western Australia, 2008.
  5., “GitHub-Bitcoin,” GitHub.Inc, 04 January 2017. [Online]. Available: [Accessed 24 May 2016].
  6. M. Katina, in Innovative Automatic Identification and Location-Based Services, IGI Global, 2009, pp. 25-233.
  7. R. Handa, et al., Google Wallet - A Glimpse into the future of mobile payments, 2011.
  8. M. Roland, “Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack,” Hagenberg, Austria, 2013.
  9. R. Tripathi and S. Agrawal, “Critical Analysis of RSA Public Key Cryptosystem,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. IV, no. 7, 2014.
  10. M. J. Casey and P. Vigna, “Bitcoin and the Digital-Currency Revolution,” The Wall Street Journal, 23 January 2015. [Online]. Available: [Accessed 2 April 2016].
  11. P. McCorry, et al., “Refund attacks on Bitcoin’s Payment Protocol,” UK, 2016.
  12. M. Lei, “Exploiting Bitcoin’s Topology for Double-spend Attacks,” Zurich, 2015.
  13. M. Karpinsky and Y. Kinakh, “Reliability of RSA Algorithm and Its Computational Complexity,” International Scientific Journal of Computing, vol. II, no. 3, 2003.
  14. R. Tripathi and S. Agrawal, “Comparative Study of Symmetric and Asymmetric,” International Journal of Advance Foundation and Research in Computer (IJAFRC), vol. I, no. 6, 2014.
  15. D. Roio, et al., “Design of Social Digital Currency,” 2015.
  16. K. Croman, et al., “On Scaling Decentralized Blockchains,” 2015.
  17. M. Stevens, “Attacks on Hash Functions and Applications,” 2012.
  18. S. Aggarwal, et al., “A review of Comparative Study of MD5 and SHA Security Algorithm,” International Journal of Computer Applications (0975 – 8887), vol. CIV, 2014.
  19. P. D. Harish, “Towards Designing Energy-Efficient Secure Hashes,” Florida, 2015.
  20. IBM, “Learn How to Choose the Right Database for the Job,” IBM, 2016.
  21. “GitHub:senzprojects/udp-switch,” 20 August 2016. [Online]. Available: [Accessed 30 April 2016].


Cryptocurrency, Blockchain Architecture, Peer-to-Peer, Online Transactions, Digital Payment, Double Spending Attack